Games and the Impossibility of Realizable Ideal Functionality

نویسندگان

  • Anupam Datta
  • Ante Derek
  • John C. Mitchell
  • Ajith Ramanathan
  • Andre Scedrov
چکیده

A cryptographic primitive or a security mechanism can be specified in a variety of ways, such as a condition involving a game against an attacker, construction of an ideal functionality, or a list of properties that must hold in the face of attack. While game conditions are widely used, an ideal functionality is appealing because a mechanism that is indistinguishable from an ideal functionality is therefore guaranteed secure in any larger system that uses it. We relate ideal functionalities to games by defining the set of ideal functionalities associated with a game condition and show that under this definition, which reflects accepted use and known examples, bit commitment, a form of group signatures, and some other cryptographic concepts do not have any realizable ideal functionality.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Impossibility of Realizable Ideal Functionality

A cryptographic primitive or a security mechanism can be specified in a variety of ways, such as a condition involving a game against an attacker, construction of an ideal functionality, or a list of properties that must hold in the face of attack. One reason that an ideal functionality is appealing is that if an implementation cannot be distinguished from an ideal functionality, by any feasibl...

متن کامل

On Signatures of Knowledge

In a traditional signature scheme, a signature σ on a message m is issued under a public key PK, and can be interpreted as follows: “The owner of the public key PK and its corresponding secret key has signed message m.” In this paper we consider schemes that allow one to issue signatures on behalf of any NP statement, that can be interpreted as follows: “A person in possession of a witness w to...

متن کامل

Concurrent Secure Computation via Non-Black Box Simulation

Recently, Goyal (STOC’13) proposed a new non-black box simulation techniques for fully concurrent zero knowledge with straightline simulation. Unfortunately, so far this technique is limited to the setting of concurrent zero knowledge. The goal of this paper is to study what can be achieved in the setting of concurrent secure computation using non-black box simulation techniques, building upon ...

متن کامل

بررسی‌ مسیر‌های الکترون در لیزر الکترون آزاد با میدان ویگلر مارپیچی واقعی و کانال یونی راهنما

  A detailed analysis of electron trajectories in a realizable helical wiggler free electron laser with ion channel guiding using electron (single particle dynamics) is presented. Conditions for stability of electron orbit have been investigated, calculations are made to illustrate. Conclusion shows that there are differences stable (unstable) condition(s) electron trajectories between ideal he...

متن کامل

Realizable and Unrealizable Specifications of Reactive Systems

2 The General Case 2 2.1 Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.2 Realizable Specifications . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.3 Realizability Under Fairness . . . . . . . . . . . . . . . . . . . . . . . 5 2.4 Weakly Realizable Specifications . . . . . . . . . . . . . . . . . . . . . 6 2.5 Games and Specifications . . . . . . . . . . ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005